About 2,070 results
Open links in new tab
  1. PoPETs Proceedings — Volume 2018 - petsymposium.org

    Volume 2018 Issue 1 Editors’ Introduction Rachel Greenstadt (Drexel University), Damon McCoy (New York University), Carmela Troncoso (IMDEA Software Institute) Efficient Dynamic …

  2. Proceedings on Privacy Enhancing Technologies ; 2018 (3):123–142 Ehsan Hesamifard*, Hassan Takabi, Mehdi Ghasemi, and Rebecca N. Wright

  3. Privacy-preserving Machine Learning as a Service

    Volume: 2018 Issue: 3 Pages: 123–142 DOI: Download PDF Abstract: Machine learning algorithms based on deep Neural Networks (NN) have achieved remarkable results and are …

  4. Editors’ Introduction DOI 10.1515/popets-2018-0028 It is our great pleasure to introduce the fourth issue of the fourth volume of PoPETs, an open access journal that publishes articles accepted …

  5. Privacy Pass: Bypassing Internet Challenges Anonymously

    Volume: 2018 Issue: 3 Pages: 164–180 DOI: Download PDF Abstract: The growth of content delivery networks (CDNs) has engendered centralized control over the serving of internet …

  6. Proceedings on Privacy Enhancing Technologies ; 2018 (3):164–180 Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, and Filippo Valsorda

  7. Proceedings on Privacy Enhancing Technologies ; 2018 (4):159–178 Daniel Demmler*, Peter Rindal, Mike Rosulek, and Ni Trieu

  8. PoPETs Proceedings — Differentially Private Oblivious RAM

    Volume: 2018 Issue: 4 Pages: 64–84 DOI: Download PDF Abstract: In this work, we investigate if statistical privacy can enhance the performance of ORAM mechanisms while providing …

  9. PoPETs Proceedings — Turtles, Locks, and Bathrooms: …

    Volume: 2018 Issue: 4 Pages: 5–32 DOI: https://doi.org/10.1515/popets-2018-0029 Download PDF Abstract: Are the many formal definitions and frameworks of privacy consistent with a …

  10. PoPETs Proceedings — Onion-AE: Foundations of Nested Encryption

    Volume: 2018 Issue: 2 Pages: 85–104 DOI: https://doi.org/10.1515/popets-2018-0014 Download PDF Abstract: Nested symmetric encryption is a well-known technique for low-latency …